Skip to content
CIO CHIME
Login
  • About
    • FAQ
    • Board & Staff
    • News, Press & Stories
  • Membership
    • Join AEHIS
    • Benefits
    • Committees
    • Awards
    • CISO Resources
    • CHISL
  • Education
    • HSL Forum
    • Events
    • Webinars
    • About LIVE Webinars
    • LIVE Webinar Proposal Form
    • CEUs
      • + AEHIS Events
      • + Non-AEHIS Events
    • Innovation Beyond the Edge
  • Public Policy
    • Regulatory Resources
    • Congressional Resources
  • Foundation
    • Membership Application
    • Benefits
    • Partners
    • Press Releases
  • Contact

Event Details

The Critical Difference: HIPAA Security Compliance Assessment v. HIPAA Security Risk Analysis

09c27dea-bda7-4756-844f-62cb8bd97031

Event Information

Compliance assessment? Security Evaluation? Risk Assessment? Risk Analysis? Compliance Analysis? Just what does the HIPAA Security Final Rule and/or The HITECH Act and/or Meaningful Use Final Rule require? Numerous experts have advisedthat the best way to get started with your compliance program is to take stock of where you are today.  Unfortunately, the advice includes many terms used interchangeably, such as:  Compliance Assessment, Security Evaluation, Risk Assessment, Risk Analysis and Compliance Analysis.  This webinar ends the confusion, identifies the types of evaluations required by the HIPAA Security Final Rule (and Meaningful Use Stage I and Stage 2 Requirements) and explains the differences.

---

Learning Objectives:

  • Explain the difference between these two Security Rule Evaluation requirements
  • Identify proven approaches to completing these evaluations
  • Discuss step-by-step instructions for compliance assessments and risk analysis

Start Date: 08/19/2015
Event Type: AEHIS LIVE Webinar , Archived
Session Speaker(s):

Bob Chaput, CISSP, HCISPP, CRISC, CIPP/US, CEO, Clearwater Compliance LLC



Please login or become a member to view register


MEMBERSHIP

LEARN MORE & APPLY

LOG IN

UPCOMING EVENTS SEE MORE

  • 11/10/2021 - ZeroTrust Driven Advanced Threat Management for Hospitals
  • 11/16/2021 - Moving Beyond Patch Tuesday: Keeping Your Connected Devices up to Date
  • 03/18/2022 - CHIME Career Development Miniseries: Engaged Virtually
  • SITE
    • About
    • Membership
    • Education
    • Public Policy
    • Foundation
    • Contact
  • MEMBERSHIP
    • Login
    • Become a Member
    • Become a Foundation Partner
  • SOCIAL
    •      
  • CONTACT US

    710 Avis Drive, Suite 200
    Ann Arbor, MI 48108
    Phone: (734) 665-0000
    Fax: (734) 665-4922

    MAP& DIRECTIONS

  • Logo
  • About
    • FAQ
    • Board & Staff
    • News, Press & Stories
  • Membership
    • Join AEHIS
    • Benefits
    • Committees
    • Awards
    • CISO Resources
    • CHISL
  • Education
    • HSL Forum
    • Events
    • Webinars
    • About LIVE Webinars
    • LIVE Webinar Proposal Form
    • CEUs
      • + AEHIS Events
      • + Non-AEHIS Events
    • Innovation Beyond the Edge
  • Public Policy
    • Regulatory Resources
    • Congressional Resources
  • Foundation
    • Membership Application
    • Benefits
    • Partners
    • Press Releases
  • Contact
Copyright 2025 CHIME College of Healthcare Information Management Executives
Sponsors
Privacy Policy     Terms of Use    Web Design by build/create
By using our website you agree to our updated Privacy Policy and Terms of Use. I Accept